Strong candidates that are making a transition from other technology areas into Cyber Security will also be considered.
Key Responsibilities:
As part of your day-to-day activities, you will be involved in all or some of these activities based on your skills and development path:
Investigating Cyber Security alerts generated by various tools and platforms.
Configuring and optimizing Cyber Security tools based on fresh threat intelligence and the organization’s unique requirements.
Collaborating as a Cyber Security subject matter expert on projects, providing guidance and requirements to address security compliance and reduce risk.
Writing and reviewing security policies and standards.
Performing Cyber Security due diligence on third parties and vendors.
Performing proactive threat hunting, analyzing logs and configurations to identify early warning signs of breaches and malicious activities.
Generating reports and metrics that measure the effectiveness of Cyber Security controls.
Collaborating with operational teams to remediate vulnerabilities and strengthen Cyber Security controls and configurations.
Assisting in defining, updating and operating Cyber Security processes.
Contributing to raising the awareness to Cyber Security threats through training, Phishing simulations, bulletins and generally being a champion for Cyber Security in every interaction.
Knowledge, Skills, Abilities and Competencies:
These qualifications will make you successful in this role (and don’t worry if you don’t have all of them):
Experience in an information security focused role, or a role that had significant Cyber Security functions (2-4 years preferred experience).
Good technical background in networking and system administration.
Experience using and managing a variety of tools and technologies, like SIEM, EDR, Vulnerability Management, Firewalls, or enterprise SaaS solutions.
Experience with Cyber Security investigations, Cyber forensics or threat hunting is an advantage.
Familiarity with public Cloud technology, especially AWS.
Relevant certifications would be great, like CC, SSCP, CISSP, CEH or any GIAC certificate.
Familiarity with security frameworks like NIST, MITRE, ISO27001, PCI-DSS.
Programming and/or system scripting and working with API’s.
Understanding application security concepts, penetration testing concepts and techniques.
A college or university degree in a relevant field of study would be nice but not mandatory.
As a person, you will need to:
Work well with others in a collaborative environment.
Be able to learn quickly and adjust to changing technologies and Cyber Security threats.
Be a self-starter, able to initiate activities and follow through.
Be curious and think outside the box sometimes.
Have good communications skills and the ability to convey ideas and information orally and in writing.
Love puzzles!
We thank you for your interest. Only those selected for an interview will be contacted.
GFL is committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. If you are interested in applying for employment and need special assistance or an accommodation to apply for a posted position, please contact myworkdayrecruitment@gflenv.com